================================================================== BUG: KASAN: global-out-of-bounds in __find_rr_leaf+0xbdf/0xe00 net/ipv6/route.c:838 Read of size 4 at addr ffffffff9af9a510 by task ksoftirqd/3/33 CPU: 3 UID: 0 PID: 33 Comm: ksoftirqd/3 Not tainted 6.15.0-rc5-syzkaller-00032-g0d8d44db295c #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xe0/0x110 mm/kasan/report.c:634 __find_rr_leaf+0xbdf/0xe00 net/ipv6/route.c:838 find_rr_leaf net/ipv6/route.c:890 [inline] rt6_select net/ipv6/route.c:934 [inline] fib6_table_lookup+0x57c/0xa30 net/ipv6/route.c:2230 ip6_pol_route+0x1cc/0x1230 net/ipv6/route.c:2266 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2335 [inline] ip6_route_input+0x662/0xc00 net/ipv6/route.c:2631 ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66 ip6_rcv_finish net/ipv6/ip6_input.c:77 [inline] NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] ipv6_rcv+0x1e8/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5887 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6000 process_backlog+0x442/0x15e0 net/core/dev.c:6352 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7324 napi_poll net/core/dev.c:7388 [inline] net_rx_action+0xa97/0x1010 net/core/dev.c:7510 handle_softirqs+0x216/0x8e0 kernel/softirq.c:579 run_ksoftirqd kernel/softirq.c:968 [inline] run_ksoftirqd+0x3a/0x60 kernel/softirq.c:960 smpboot_thread_fn+0x3f4/0xae0 kernel/smpboot.c:164 kthread+0x3c2/0x780 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 The buggy address belongs to the variable: __key.0+0x10/0x40 The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1af9a flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000002000 ffffea00006be688 ffffea00006be688 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffffffff9af9a400: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 ffffffff9af9a480: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 >ffffffff9af9a500: 00 00 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 ^ ffffffff9af9a580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 ffffffff9af9a600: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 ==================================================================